Hacker Newsnew | past | comments | ask | show | jobs | submit | jenandre's submissionslogin
1.Building an AI Code Review Agent with Claude Code (seekmaro.com)
4 points by jenandre 9 months ago | past
2.How venture capitalists make money and why it matters to you (reverbadvisors.com)
8 points by jenandre on Nov 6, 2017 | past
3.When it comes to debugging, believe no one (medium.com/fun_cuddles)
2 points by jenandre on March 30, 2017 | past
4.Introduction to Sysdig Falco (komand.com)
3 points by jenandre on June 17, 2016 | past
5.GDB for fun and profit (komand.com)
1 point by jenandre on June 16, 2016 | past
6.Introduction to Osquery for Threat Detection and DFIR (komand.com)
2 points by jenandre on June 15, 2016 | past
7.My Experience with Linux of the 90s, or Why I Have Linux Desktop PTSD (medium.com/fun_cuddles)
2 points by jenandre on Feb 14, 2016 | past
8.The West Coast Offense for Startups (cortlandtjohnson.com)
2 points by jenandre on Oct 13, 2015 | past
9.RPC over Docker containers as plugins (github.com/jandre)
2 points by jenandre on Oct 12, 2015 | past
10.Keys to Building a Successful Cybersecurity Startup: Credibility,Maturity&Trust (cortlandtjohnson.com)
1 point by jenandre on Oct 8, 2015 | past
11.Show HN: Codetainer – A Docker container in your browser (github.com/codetainerapp)
42 points by jenandre on Oct 3, 2015 | past | 9 comments
12.Show HN: Codetainer – A Docker container in your browser (github.com/codetainerapp)
4 points by jenandre on Oct 2, 2015 | past
13.Safe-commit-hook: prevent developers from checking in sensitive files (github.com/jandre)
42 points by jenandre on Oct 1, 2015 | past | 8 comments
14.Pitching Your Cybersecurity Startup: Do’s and Don'ts (linkedin.com)
2 points by jenandre on Sept 30, 2015 | past
15.Hacker news for security (securityhq.io)
3 points by jenandre on Sept 3, 2015 | past
16.What's all the hubbub about vulnerable Docker images? (dockersecurity.org)
1 point by jenandre on June 1, 2015 | past
17.After all this time, we still can’t crypto (medium.com/fun_cuddles)
2 points by jenandre on April 4, 2015 | past
18.Who Watches the Watchmen? Securing Configuration Management Systems (threatstack.com)
1 point by jenandre on Feb 25, 2015 | past
19.The Linux “Grinch” Vulnerability: Separating Fact from FUD (threatstack.com)
2 points by jenandre on Dec 18, 2014 | past
20.Hackers or Engineers? Who to hire for your startup, and why (medium.com/fun_cuddles)
1 point by jenandre on Oct 27, 2014 | past
21.A Tale of Nagios and the Bash Vulnerability (threatstack.com)
5 points by jenandre on Sept 25, 2014 | past
22.Docker breakout exploit analysis (medium.com/fun_cuddles)
16 points by jenandre on June 18, 2014 | past | 2 comments
23.Startups, Security, and Noble Vision (medium.com/fun_cuddles)
1 point by jenandre on June 1, 2014 | past
24.Dune is in your head (boingboing.net)
2 points by jenandre on March 30, 2014 | past
25.Free startup idea: fix micropayments for content (medium.com/p)
1 point by jenandre on Feb 22, 2014 | past
26.Opening files in node.js considered harmful (medium.com/p)
3 points by jenandre on Jan 18, 2014 | past
27.One Day of Go (gist.github.com)
4 points by jenandre on Jan 2, 2014 | past
28."Yt? Seeing something odd in the logs..." (medium.com/p)
2 points by jenandre on Dec 27, 2013 | past
29.Cloud Security is not a binary question (medium.com/p)
2 points by jenandre on Nov 21, 2013 | past
30.Setting up a Kernel Debug Environment (for pussies) (gist.github.com)
1 point by jenandre on Nov 11, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: